Q1: It is the crime done by collecting personal information and effectively posing as another individual.
- a) spooling
- b) hacking
- c) cracking
- d) identity theft
Q2: FTP is used for :
- a) browsing the internet
- b) sending emails
- c) transferring files from one computer to another
- d) all
Q3: It is a method used to protect email message.
- a) encryption
- b) decryption
- c) fragmentation
- d) spamming
Q4: Normally, network cable has ____ pairs of wires.
- a) 2
- b) 4
- c) 6
- d) 8
Q5:Which one is characteristic of TCP?
- a) fast but unreliable delivery
- b) assurance of packet delivery
- c) best effort
- d) all